EP1705869A1 - Method and apparatus for locating mobile device users within a wireless computer network - Google Patents

Method and apparatus for locating mobile device users within a wireless computer network Download PDF

Info

Publication number
EP1705869A1
EP1705869A1 EP05253558A EP05253558A EP1705869A1 EP 1705869 A1 EP1705869 A1 EP 1705869A1 EP 05253558 A EP05253558 A EP 05253558A EP 05253558 A EP05253558 A EP 05253558A EP 1705869 A1 EP1705869 A1 EP 1705869A1
Authority
EP
European Patent Office
Prior art keywords
user
network
mobile device
access point
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
EP05253558A
Other languages
German (de)
French (fr)
Other versions
EP1705869B1 (en
Inventor
Vern Tact Tan
David Roxburgh
Matthew William Capp
Patrick Brian Farley
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
British Telecommunications PLC
Original Assignee
British Telecommunications PLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by British Telecommunications PLC filed Critical British Telecommunications PLC
Publication of EP1705869A1 publication Critical patent/EP1705869A1/en
Application granted granted Critical
Publication of EP1705869B1 publication Critical patent/EP1705869B1/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/54Presence management, e.g. monitoring or registration for receipt of user log-on information, or the connection status of the users
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/53Network services using third party service providers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/30Definitions, standards or architectural aspects of layered protocol stacks
    • H04L69/32Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
    • H04L69/322Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions
    • H04L69/329Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer [OSI layer 7]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]

Definitions

  • the present invention relates to a method and apparatus for locating mobile device users within a wireless computer network, and in particular to such a method and apparatus for operating within a computer network including one or more wireless access devices.
  • the present invention is applicable to such a method and apparatus in which the network includes wireless access points and co-operating mobile devices operating in accordance with the IEEE 802.1x wireless network standard.
  • the IEEE 802.1x wireless network standard permits mobile devices with a suitable Network interface Card (or an equivalent functionality built into the mobile device in a more integrated manner), hereinafter referred to as an 802.1x NIC, to wirelessly access a wired network.
  • a suitable Network interface Card or an equivalent functionality built into the mobile device in a more integrated manner
  • the wired network is connected to the Internet and also provides facilities for connecting in a secure manner to a company's intranet using a Virtual Private Network (VPN) through the Internet, or some similar such technology.
  • VPN Virtual Private Network
  • Each hotspot typically has a fairly small area of operation, determined by the transmission power of the wireless access device (which is the main piece of kit required to form a Hotspot) and the geography of the area surrounding the wireless access device, typically of the order of a few tens of metres distant from the wireless access device at most. It has thus been noted on several occasions in the past that the information about the wireless access device to which a mobile device is connected could be used to obtain location information as to the whereabouts of the mobile device in question.
  • US published patent application No. US 2002/0095486 describes a method of locating mobile computer users in a wireless network in which each mobile device includes some software which identifies which network access point it is talking to (or, in a preferred embodiment, it attempts to receive signals from all access points in range and tries to estimate its location, relative to all access points from which it can receive a signal, based on a pre-stored map of expected signal strengths from access points) and then either sends its own estimated location to a location server (located somewhere within the wired network) or it simply sends the ID of the access point to the location server (which then looks up the location of the access point itself and infers the location of the device on this basis).
  • the application does discuss in general terms the issue that there is not necessarily always a one to one correspondence between user and device, but it does not explain fully how it overcomes this hurdle when looking for a particular user. It seems to assume that there is a one to many correspondence between users and devices such that a single user may use more than one device, but a given device will only ever have one user. In such a case, finding out where a user is simply requires establishing which of a user's set of devices has been active most recently (assuming this is an indication of the user having done something locally at the device to make it active) and this is what the application describes the system (in particular the location server) as doing.
  • a computer network operable to provide location information about a user of a mobile device whilst the device is connected to the computer network via an access point to the network
  • the computer network including: a captive portal server, for requiring a user to be authenticated and authorised by a service provider to which the user subscribes when the user's mobile device is connected to the network via the access point and for instructing the access point to provide the mobile device with access to the network (or some part thereof) once the user has been duly authenticated and authorised; and a user location manager server for managing the storage, processing and maintenance of user location details; wherein the captive portal server is further operable to notify the user location manager server, upon completion of a successful authentication or re-authentication of the user by the user's service provider, of the user's identity and the identity of the access point to which the device is connected.
  • the access point is a wireless access point (also referred to as a wireless router) able to communicate with a mobile device using a standard protocol such as any of the IEEE 802.11 standards (e.g. 802.11b, 802.11a, 802.11g, etc, which standards are conveniently referred to generically as being an 802.11x standard) or any of the Bluetooth specifications (see the Bluetooth organisation's web-site for details at http://www.bluetooth.org).
  • the wireless access point uses one of the IEEE 802.11x standards.
  • the access point and the captive portal server may all be owned and operated by the user's service provider, or alternatively, they could be owned and operated by a network operator who simply has a commercial agreement with the user's service provider to enable the subscribers of the service provider to access the Internet or other commercial services via the wireless network.
  • a captive portal server for automatically supplying the user with the opportunity to authenticate him or herself onto the system, whilst preventing him or her from accessing the network until such authentication has been completed, is particularly advantageous in the above claimed system as it enables the entire system to work with mobile devices requiring no special software (other than standard drivers for controlling the wireless interface and a standard web browser). Furthermore, the use of the captive portal server as the device which submits the user location message to the location server (and thus needs some additional functionality - i.e.
  • this device requires tailoring to the particular circumstances of the network in any event so it is no great extra work to modify this device to perform the notification of the location server and furthermore, this device will also always have easy firsthand access to the information both as to whether or not the user has been successfully logged on to the network and from which access point the user is connected to the network.
  • the captive portal server transmits by Hyper Text Transfer Protocol (HTTP) over Secure Sockets Layer (SSL) (together known by the acronym HTTPS) an authentication or log-in web page, in response to an HTTP request for any web page from a standard browser application running on the user's device, which asks the user to supply some user credentials (for example a user ID and a password and possibly an identification of the service provider to which the user subscribes).
  • HTTP Hyper Text Transfer Protocol
  • SSL Secure Sockets Layer
  • HTTPS Secure Sockets Layer
  • HTTPS Secure Sockets Layer
  • the captive portal server receives the user credentials, it preferably constructs an authentication and authorisation request (in, for example, the RADIUS protocol) and transmits this to an authentication and authorisation server such as an Authentication, Authorization and Accounting (AAA) Server which performs authentication and authorisation using the RADIUS protocol.
  • AAA Authentication, Authorization and Accounting
  • the portal When the response is a request for the user to supply further credentials, this is appropriately processed by the portal and then relayed back to the user, whose response is then forwarded on by the portal back to the AAA server.
  • the portal When the response is a refusal, the portal will process this and forward on an explanatory message to the device for display to the user, but no further action is taken by way of allowing access to the network for the user.
  • no message is sent by the portal server to the location server informing the location server of the location of the user, since the user will not typically be able to receive data over the network and so there is little point in advertising his location to third parties (however, in alternative embodiments, the location information may be sent nonetheless if the access point is configured to allow certain data through to the mobile even without the device being authenticated, for example in order to allow a service to provide the user of the mobile device with details about where the user can purchase credits for accessing the network from a local retailer, etc.).
  • the portal server instructs the wireless router or access point to allow the device to have access to the network (and any interconnected networks such as a company intranet or the Internet); additionally, the portal server sends a message to the location server to inform it of the user's ID and the ID of the wireless router or access point to which the user is connected, so that the location server can update its records about the whereabouts of that particular user.
  • a method of obtaining location information about a user of a mobile device connected to a computer network via an access point comprising the device connecting to the computer network via the access point and transmitting an HTTP (or HTTPS) request to the network, the network transmitting in response to the HTTP request a log on web page to the device requesting user credentials, the network generating an authentication request in dependence upon the requested user log on credentials, and transmitting this to an AAA server, receiving a response from the AAA server and, if the response indicates that the user is authenticated and authorised, the network storing details of the identification of the user and of the access point of the network to which the mobile device is connected to the network.
  • HTTP HTTPS
  • the access point is a wireless access point and the mobile device connects to the wireless access point over a wireless interface (e.g. an IEEE 802.11x type interface, or a Bluetooth interface).
  • a wireless interface e.g. an IEEE 802.11x type interface, or a Bluetooth interface.
  • the method includes the network requiring the mobile device to periodically require re-authentication to enable the device to continue to have access to the network and the network storing, in addition to the identifications of the user and of the access point, the approximate time at which the user last authenticated or re-authenticated together with an indication that the location information is valid for approximately only as long as the period within which the network requires the user to re-authenticate him or herself.
  • the first and second aspects of the present invention are advantageous compared with prior art solutions in that the authentication process which is used to obtain the user information depends upon the user authenticating him or herself rather than the mobile device which the user is using. Since no special software is required, the user may use any device (which includes a standard browser and standard drivers for controlling the wireless interface card/device) and he or she will still be locatable.
  • the message sent from the portal server to the location server in the event of a successful log-on by the user includes the user ID successfully used by the user to logon to the network and the Internet Protocol (IP) address of the access point router (i.e. the part of the access point which deals with IP routing of IP packets).
  • IP Internet Protocol
  • the message may alternatively include an ID for the router/access point used by the wireless network operator as a more intuitive manner of identifying its routers/access points.
  • the Media Access Control (MAC) address of access point could be used instead ⁇ as this is "guaranteed" to be a unique number it should avoid any (remote) possibilities of confusion caused by two different access points having the same ID.
  • the access point is set up to require re-authentication and authorisation of the user on a frequent basis (e.g. at least as often as every five or ten minutes and preferably as often as every one or two minutes, possibly even as often as every few seconds), and the location server is set up to consider that a notification (about the user ID and the wireless router to which the user is connected) has a duration of validity approximately as long as the period after which re-authentication of the user is required by the access point.
  • a notification about the user ID and the wireless router to which the user is connected
  • the wireless router upon active initiation by a user (i.e. by the user explicitly requesting termination of the connection to the wireless router) the wireless router informs the portal server of the imminent disconnection; the portal server then informs the AAA server, which updates its records accordingly (primarily for billing purposes where the user is charged on a duration of connection basis), and at the same time it (the portal server) sends a notification to the location server informing it of the disconnection.
  • the location server communicates with a service exposure engine, such as that described in co-pending UK patent application No. 0407388.8 , which provides a common interface by which third party applications can access the information stored in the location server in a secure, safe and reliable manner.
  • a service exposure engine such as that described in co-pending UK patent application No. 0407388.8 , which provides a common interface by which third party applications can access the information stored in the location server in a secure, safe and reliable manner.
  • secure it is meant that only duly authorised and authenticated parties are able to access the location information
  • safe it is meant that the location server will not be overwhelmed or cause problems to occur on the wireless network as a result of spurious or excessive requests from third parties
  • reliable it is meant that the correct information will be provided in response to a legitimate request from a third party.
  • subsequent re-authentication of the user may be done automatically by the device on behalf of the user.
  • this is done by including in the initially downloaded authentication web-page from the portal server a Javascript application or Java applet which stores the log-on credentials supplied by the user, for the duration of the connection, and uses these stored credentials to perform the re-authentication in a timely manner.
  • a cookie could be used to prevent the user from having to continuously re-authenticate himself manually.
  • the general architecture is seen to comprise a number of mobile devices 10, 12 which are wireless capable (e.g. via a IEEE 802.11x type protocol), a fixed device 20 running an application which assists users mobile users to locate one another, the Internet 30, an Authentication, Authorization and Accounting (AAA) server 40, which is operable to identify and authenticate a user, using a secure protocol such as RADIUS, on the basis of supplied user credentials (e.g. a user ID and (an encrypted) password), and the wireless network system 100 of the present embodiment.
  • AAA Authentication, Authorization and Accounting
  • the wireless network system 100 includes a plurality of wireless routers or Access Points 110, 112 (hereinafter simply AP's) with which the wireless capable mobile devices may establish a wireless connection; a captive portal server 120 which serves a mobile device with an initial logon web page as soon as it (the mobile device) connects to one of the AP's (as well as performing other functions described in more detail below); a user location manager server 140 which manages the databases of the system 100 which track user location information including a user database 142, which stores details of registered users and, if known, the AP to which they are currently connected, as well as an AP database 144, which stores details of the AP's 110, 112 including their MAC addresses, their geographical locations and, in the present embodiment, their unique ID's as provided by the wireless network operator; and finally, the system 100 also includes a capability exposure platform 150 which provides a safe, secure and reliable interface by which third parties may access the user location data managed by the user location manager server 140.
  • the capability exposure platform 150 is
  • the AAA server 40 will be considered to be part of the system 100 since in the present embodiment the system 100 is co-owned and controlled by the service provider which operates and controls the AAA server 40 so it is appropriate to consider it as part of the system 100; however, it should be noted that in the more general case the AAA server may well be owned and operated by a different party to that which owns and operates the system 100, and indeed the system 100 may be operable to contact a number of different AAA servers depending upon which service provider the user subscribes to, etc and for that reason it is shown in Figure 1 as being outside the system 100 of the present embodiment.
  • the user location manager server 140 (and associated databases 142, 144) and/or the capability exposure platform 150 could also be owned and operated by a different party to that owning and/or operating the access points 110, 112 and captive portal server 120.
  • these various elements need not be geographically proximate to one another, etc.
  • FIG. 2 an overview of the messages sent between the mobile device 10 of the user to be located, the system 100, the device 20 running a location application, and the mobile device 12 of a locator user (i.e. a user who wishes to establish the location of the user of mobile device 10, who will hereinafter be referred to as the locatee user) when using the system of the present invention to enable the locator user to establish the location of the locatee user.
  • the process commences when the locatee user decides to try to connect to the system 100 using a wireless interface between her mobile device 10 and one of the AP's of the system 100.
  • the AP issues the mobile device 10 with a temporary IP address to be used for the duration of the session using the Dynamic Host Configuration Protocol (DHCP).
  • DHCP Dynamic Host Configuration Protocol
  • the AP acquires the MAC address of the mobile device 10; this is then used as the basis of the firewall restrictions in the AP (discussed further below).
  • the locatee user requests a web page via a standard browser operating on mobile device 10 (illustrated in Figure 2 by the "user requests web page" arrow 205). Whatever web page the user requests, the system 100 returns (as indicated by the "request user authentication” arrow 210) an authentication web page requesting the user to log on to the system by providing her user credentials.
  • the user fills in the requested credentials within the appropriate text fields provided within the authentication web page and these details are transmitted back from the mobile device 10 to the system 100 (as indicated by the "provide user credentials” arrow 215), for example by way of a new HTTP request. Having received the user credentials, the system 100 performs some internal processing (as indicated by the "authenticate user” arrow 220) the details of which will be described below with reference to Figure 3, to authenticate the user based on the received credentials.
  • the system 100 Having authenticated the user based on the received user credentials, the system 100 updates various records and gives the mobile device 10 full access to the Internet 30 (in alternative embodiments, restricted access could be given to only certain designated Internet sites, or to a company intranet, etc.); additionally it may send a confirmation web page initially confirming that the user has now been authorised to access the internet.
  • the system provides the mobile device 10 with the originally requested web page (as illustrated by the "provide user access" arrow 225 in Figure 2).
  • the locator user decides that he wishes to locate his friend, the locatee user using mobile device 10.
  • the locator is shown as using mobile device 12 in Figure 1, there is no requirement for the locator's device to be mobile. Any computing device with an Internet connection could be used for this purpose.
  • He therefore sends a request location message (indicated by the "request user location” arrow 230 in Figure 2) to the device 20 running a buddy locating application.
  • device 20 is a desktop personal computer configured to operate as a server computer in respect of users such as the locator user and configured to operate as a client in respect of the system 100 (and in particular the capability exposure platform 150 thereof, as will be described in greater detail below with reference to Figure 5).
  • the device 20 receives the "request user location" message 230 from mobile device 12, it performs some internal processing to check that the requester is authorised by the locatee user to receive the locatee user's location, and additionally it converts, if necessary, the user ID for the locatee user given by the locator user (which might be specific only to the location application running on device 20) into the user ID which will be recognised by the system 100.
  • the internal processing within device 20 is indicated in Figure 2 by the "resolve user ID” arrow 235.
  • the device 20 Having established that the locator is suitably authorised and having resolved the user ID (to find the user ID known by the system 100), the device 20 sends a message (indicated by the "locate user ID” arrow 240 in Figure 2) to the system 100 requesting the current location of the locatee user.
  • the system 100 checks that the location application running on the device 20 is suitably authorised by the locatee user to access the locatee user's current location and then transmits this information back to the requesting application running on device 20 (as represented in Figure 2 by the "user location record” arrow 245).
  • the application running on device 20 sends (as shown by the "provide user location” arrow 250) the requested location information to mobile device 12 which displays the requested information to the locator user.
  • the device 20 is connected to the Internet and is therefore able to receive requests from any device connected to the Internet.
  • the above described sequence of events assumes that the locator user has already successfully logged on to the system 100 such that it also has access to the Internet from which it can contact the device 20.
  • the steps performed in initially logging a user onto the system 100 will now be described in more detail, with a consideration of the operations of the relevant elements within the system 100, in particular AP 110, captive portal server 120, AAA server 40 and the user location manager 140.
  • the mobile device 10 sends the initial request for a web page to the AP 110 (illustrated by the "request web page" arrow 305 in Figure 3, corresponding to arrow 205 in Figure 2) the AP 110 is configured to automatically re-direct this message (including any preliminary messages, e.g.
  • the captive portal server 120 (as illustrated by the "redirect web request" arrow 310 from the AP 110 to the captive portal server 120) which responds by sending a log on web page to the mobile device 10 (as indicated by the "present logon page (HTTPS)" arrow 315 which corresponds to arrow 210 in Figure2).
  • the log on web page includes text fields in which the user can enter his user credentials (e.g. a user ID and a password) which are then transmitted back to the captive portal server 120 (as indicated by the "log on credentials (HTTPS)" arrow 320 which corresponds to arrow 215 in Figure 2).
  • the captive portal server 120 When the captive portal server 120 has received the log on credentials from the user, it generates a request (illustrated by the "request to validate user" arrow 325) to the AAA server 40 using whichever protocol the AAA server is configured to use which, in the present embodiment, is RADIUS.
  • the AAA server 40 receives the request, processes it and sends a response (indicated in Figure 3 by the "authentication status" arrow 330) back to the captive portal server 120.
  • the response from the AAA server 40 indicates that the user is successfully authenticated and so the captive portal server 120 sends a message (indicated by the "return key” arrow 335 in Figure 3) to the access point 110 informing the access point 110 to allow the connected device 10 to have full access to the Internet 30.
  • the captive portal 120 sends a message (indicated in Figure 3 by the "map user to AP" arrow 340) to the user location manager server 140, including the IP address of the access point 110 (as an identifier of the AP) and the user ID of the user submitted to the AAA server.
  • the access point 110 On receipt of the message 335 from the captive portal server 120, the access point 110 generates a "lease" of a predetermined time of, in the present embodiment, 2 minutes and reconfigures its firewall to allow IP packets (and/or HTTP requests and responses, etc.) from or to the mobile device 10 through its wired interface (which is connected directly or indirectly to the Internet 30) and through its wireless interface so that the user may browse the Internet, send emails, etc. for the duration of the lease (and beyond if the user re-authenticates before the expiry of the lease).
  • the lease is issued based on the MAC address of the mobile device which should in theory be unique for that device.
  • the generation of the lease and accompanying reconfiguration of its firewall is illustrated in Figure 3 by the "issue lease" arrow 345.
  • the access point also automatically permits the originally requested web page to be collected from the Internet 30 and automatically displayed to the user (in alternative embodiments, the captive portal server might send a confirmation web page informing the user that he has successfully logged on etc.).
  • the transmission of the originally requested web page to the user is indicated in Figure 3 by the "redirect to requested page" arrow 350 (which corresponds to arrow 225 in Figure 2).
  • the user location manager server 140 On receipt of the message 340 from the captive portal server 120, the user location manager server 140 updates its records in the user database 142 to specify IP address of the access point 110 to which the user is connected, together with the present time (in the present embodiment the typical lease time is the same for all users and all access points and so this information is stored centrally and used to determine, on the basis of the timestamp information stored in the user details, whether or not any particular record for any given user is valid or not).
  • the access point When the access point receives this it revokes the "lease” given to the mobile device 10 by "taking back the IP address” (in accordance with the DHCP) from the mobile device 10 so it is free to allocate this to another device logging on to the AP 110 and by re-configuring its firewall to prevent Internet Protocol (IP) packets from passing through the AP 110 either to or from the mobile device 10 (or more specifically to or from the IP address or the MAC address of the mobile device 10).
  • IP Internet Protocol
  • the AP 110 sends an "inform of logout” message 420 to the captive portal server 120, informing the captive portal server that the user has logged out, whereupon the captive portal server 120 sends a "notify of user logout” message 425 to the user location manager server 140 which updates its records to indicate that the corresponding user has now logged out of the network and thus its location is no longer known and/or valid.
  • the AP 110 After sending the "inform of logout" message 420 to the captive portal server 120, the AP 110 also sends an "acknowledge logout” message 430 to the mobile device 10 to acknowledge that the device 10 has now been logged out of the system 100.
  • the steps taken by, and the messages exchanged between, the location application (running on device 20), the capability exposure platform 150 and the user location manager server 140, during a request by the location application for location information about a user logged on to the system 100 are now described.
  • a third party application such as the location application running on device 20 wishes to obtain location information about a user who might be connected to the system 100 via a wireless AP, it sends a message to the capability exposure platform 150, typically, as in the present embodiment, via an Internet connection.
  • the location application running on device 20 wishes, on behalf of one of its clients (i.e. the locator user operating mobile device 12), to obtain the current location of the locatee user, it sends a "query user location(user ID)" message 505 (which includes the (user ID) as known by the system 100).
  • the capability exposure platform 150 performs some internal processing to authenticate the application (i.e. that it is what it says it is) and to check that it is duly authorised by the user to be located to obtain the information, as indicated by the "resolve privacy requirements" arrow 510. Having satisfied itself that the application's request is legitimate, it generates a "query user location (user ID)" message 515 of its own which is sent to the user location manager server 140.
  • the location manager server 140 Upon receipt of the query message 515, the location manager server 140 queries the user database 142 to determine if it has stored a current record of the identified user, and if so it obtains the identity of the AP 110 to which the user in question is currently connected (this process is indicated in Figure 5 by the "get User (user ID)'s AP" message 520).
  • the user location manager server 140 Having obtained the ID (or IP address) of the AP 110 to which the locatee user is connected, the user location manager server 140 then queries the AP database 144 (with a "get AP location record” message 525) to obtain the details of the whereabouts of the AP 110 (whose identity was determined from the preceding lookup in the user database 142) and then it passes on the obtained location information back to the capability exposure platform 150 with a "return location record” message 530. The capability exposure platform 150 then passes on this location information in turn back to the location application which asked for the information with a "return location record” message 535 of its own.

Abstract

A computer network 100 is operable to provide location information about a user of a mobile device 10 whilst the device is connected to the computer network via a wireless access point 110 to the network. The computer network includes a captive portal server 120, for requiring a user to be authenticated and authorised by a service provider to which the user subscribes when the user's mobile device 10 is connected to the network 100 via the wireless access point 110 and for instructing the wireless access point 110 to provide the mobile device 10 with access to the network 100 once the user has been duly authenticated and authorised. The network 100 also includes a user location manager server 140 for managing the storage, processing and maintenance of user location details. The captive portal server 120 is further operable to notify the user location manager server 140, upon completion of a successful authentication or re-authentication of the user by the user's service provider, of the user's identity and the identity of the wireless access point 110 to which the device is connected. The network also includes or has access to a capability exposure platform for providing a secure interface exposed to third party applications via a convenient communication means such as the Internet. The network also includes, or has access to, an Authentication, Authorisation and Accounting (AAA) server 40 for performing the secure authentication of the user.

Description

    Technical Field
  • The present invention relates to a method and apparatus for locating mobile device users within a wireless computer network, and in particular to such a method and apparatus for operating within a computer network including one or more wireless access devices. In particular, the present invention is applicable to such a method and apparatus in which the network includes wireless access points and co-operating mobile devices operating in accordance with the IEEE 802.1x wireless network standard.
  • Background to the Invention
  • The IEEE 802.1x wireless network standard permits mobile devices with a suitable Network interface Card (or an equivalent functionality built into the mobile device in a more integrated manner), hereinafter referred to as an 802.1x NIC, to wirelessly access a wired network. Typically the wired network is connected to the Internet and also provides facilities for connecting in a secure manner to a company's intranet using a Virtual Private Network (VPN) through the Internet, or some similar such technology.
  • Currently in Britain and other advanced countries, a large number of so called "Public Wi-Fi Hotspots" are being set up which enable devices with an 802.1x NIC to connect wirelessly to the Internet or their corporate network when at one of these Hotspots. For example, in the UK, British Telecommunications plc (BT) is responsible for the set-up and operation of some of these public Hotspots. Individual consumers may connect through to the Internet at one of these BT Hotspots by paying BT a service charge for such usage. Corporate customers may pay BT to enable their employees to access their corporate intranet from one of these hotspots via a VPN.
  • In order to ensure that only duly authorised users can take advantage of the hotspots to access the Internet or a corporate intranet, an authentication and authorisation process is employed which is discussed in greater detail below.
  • Each hotspot typically has a fairly small area of operation, determined by the transmission power of the wireless access device (which is the main piece of kit required to form a Hotspot) and the geography of the area surrounding the wireless access device, typically of the order of a few tens of metres distant from the wireless access device at most. It has thus been noted on several occasions in the past that the information about the wireless access device to which a mobile device is connected could be used to obtain location information as to the whereabouts of the mobile device in question.
  • For example, US published patent application No. US 2002/0095486 describes a method of locating mobile computer users in a wireless network in which each mobile device includes some software which identifies which network access point it is talking to (or, in a preferred embodiment, it attempts to receive signals from all access points in range and tries to estimate its location, relative to all access points from which it can receive a signal, based on a pre-stored map of expected signal strengths from access points) and then either sends its own estimated location to a location server (located somewhere within the wired network) or it simply sends the ID of the access point to the location server (which then looks up the location of the access point itself and infers the location of the device on this basis).
  • The application does discuss in general terms the issue that there is not necessarily always a one to one correspondence between user and device, but it does not explain fully how it overcomes this hurdle when looking for a particular user. It seems to assume that there is a one to many correspondence between users and devices such that a single user may use more than one device, but a given device will only ever have one user. In such a case, finding out where a user is simply requires establishing which of a user's set of devices has been active most recently (assuming this is an indication of the user having done something locally at the device to make it active) and this is what the application describes the system (in particular the location server) as doing.
  • Summary of the Invention
  • According to a first aspect of the present invention, there is provided a computer network operable to provide location information about a user of a mobile device whilst the device is connected to the computer network via an access point to the network, the computer network including: a captive portal server, for requiring a user to be authenticated and authorised by a service provider to which the user subscribes when the user's mobile device is connected to the network via the access point and for instructing the access point to provide the mobile device with access to the network (or some part thereof) once the user has been duly authenticated and authorised; and a user location manager server for managing the storage, processing and maintenance of user location details; wherein the captive portal server is further operable to notify the user location manager server, upon completion of a successful authentication or re-authentication of the user by the user's service provider, of the user's identity and the identity of the access point to which the device is connected.
  • Preferably the access point is a wireless access point (also referred to as a wireless router) able to communicate with a mobile device using a standard protocol such as any of the IEEE 802.11 standards (e.g. 802.11b, 802.11a, 802.11g, etc, which standards are conveniently referred to generically as being an 802.11x standard) or any of the Bluetooth specifications (see the Bluetooth organisation's web-site for details at http://www.bluetooth.org). Most preferably the wireless access point uses one of the IEEE 802.11x standards.
  • The access point and the captive portal server may all be owned and operated by the user's service provider, or alternatively, they could be owned and operated by a network operator who simply has a commercial agreement with the user's service provider to enable the subscribers of the service provider to access the Internet or other commercial services via the wireless network.
  • The use of a captive portal server for automatically supplying the user with the opportunity to authenticate him or herself onto the system, whilst preventing him or her from accessing the network until such authentication has been completed, is particularly advantageous in the above claimed system as it enables the entire system to work with mobile devices requiring no special software (other than standard drivers for controlling the wireless interface and a standard web browser). Furthermore, the use of the captive portal server as the device which submits the user location message to the location server (and thus needs some additional functionality - i.e. over and above that of a standard captive portal server) is particularly advantageous because this device requires tailoring to the particular circumstances of the network in any event so it is no great extra work to modify this device to perform the notification of the location server and furthermore, this device will also always have easy firsthand access to the information both as to whether or not the user has been successfully logged on to the network and from which access point the user is connected to the network.
  • Preferably, the captive portal server transmits by Hyper Text Transfer Protocol (HTTP) over Secure Sockets Layer (SSL) (together known by the acronym HTTPS) an authentication or log-in web page, in response to an HTTP request for any web page from a standard browser application running on the user's device, which asks the user to supply some user credentials (for example a user ID and a password and possibly an identification of the service provider to which the user subscribes). When the captive portal server receives the user credentials, it preferably constructs an authentication and authorisation request (in, for example, the RADIUS protocol) and transmits this to an authentication and authorisation server such as an Authentication, Authorization and Accounting (AAA) Server which performs authentication and authorisation using the RADIUS protocol. When the AAA server has checked the user supplied credentials against its stored records, it will issue a response which may be an acceptance, a refusal or a request for the user to supply further credentials.
  • When the response is a request for the user to supply further credentials, this is appropriately processed by the portal and then relayed back to the user, whose response is then forwarded on by the portal back to the AAA server. When the response is a refusal, the portal will process this and forward on an explanatory message to the device for display to the user, but no further action is taken by way of allowing access to the network for the user. Furthermore, in one embodiment no message is sent by the portal server to the location server informing the location server of the location of the user, since the user will not typically be able to receive data over the network and so there is little point in advertising his location to third parties (however, in alternative embodiments, the location information may be sent nonetheless if the access point is configured to allow certain data through to the mobile even without the device being authenticated, for example in order to allow a service to provide the user of the mobile device with details about where the user can purchase credits for accessing the network from a local retailer, etc.). When the response is an acceptance, the portal server instructs the wireless router or access point to allow the device to have access to the network (and any interconnected networks such as a company intranet or the Internet); additionally, the portal server sends a message to the location server to inform it of the user's ID and the ID of the wireless router or access point to which the user is connected, so that the location server can update its records about the whereabouts of that particular user.
  • According to a second aspect of the present invention, there is provided a method of obtaining location information about a user of a mobile device connected to a computer network via an access point, the method comprising the device connecting to the computer network via the access point and transmitting an HTTP (or HTTPS) request to the network, the network transmitting in response to the HTTP request a log on web page to the device requesting user credentials, the network generating an authentication request in dependence upon the requested user log on credentials, and transmitting this to an AAA server, receiving a response from the AAA server and, if the response indicates that the user is authenticated and authorised, the network storing details of the identification of the user and of the access point of the network to which the mobile device is connected to the network.
  • Preferably the access point is a wireless access point and the mobile device connects to the wireless access point over a wireless interface (e.g. an IEEE 802.11x type interface, or a Bluetooth interface).
  • Preferably the method includes the network requiring the mobile device to periodically require re-authentication to enable the device to continue to have access to the network and the network storing, in addition to the identifications of the user and of the access point, the approximate time at which the user last authenticated or re-authenticated together with an indication that the location information is valid for approximately only as long as the period within which the network requires the user to re-authenticate him or herself.
  • The first and second aspects of the present invention are advantageous compared with prior art solutions in that the authentication process which is used to obtain the user information depends upon the user authenticating him or herself rather than the mobile device which the user is using. Since no special software is required, the user may use any device (which includes a standard browser and standard drivers for controlling the wireless interface card/device) and he or she will still be locatable.
  • Preferably, the message sent from the portal server to the location server in the event of a successful log-on by the user includes the user ID successfully used by the user to logon to the network and the Internet Protocol (IP) address of the access point router (i.e. the part of the access point which deals with IP routing of IP packets). The message may alternatively include an ID for the router/access point used by the wireless network operator as a more intuitive manner of identifying its routers/access points. Alternatively, the Media Access Control (MAC) address of access point could be used instead` as this is "guaranteed" to be a unique number it should avoid any (remote) possibilities of confusion caused by two different access points having the same ID.
  • Preferably the access point is set up to require re-authentication and authorisation of the user on a frequent basis (e.g. at least as often as every five or ten minutes and preferably as often as every one or two minutes, possibly even as often as every few seconds), and the location server is set up to consider that a notification (about the user ID and the wireless router to which the user is connected) has a duration of validity approximately as long as the period after which re-authentication of the user is required by the access point.
  • Preferably, in addition to the authentication and authorisation of a user expiring by the passive action of a user failing to re-authenticate (or by the user going out of range of the access point's transceiver which, in the present embodiment, more or less amounts to the same thing), upon active initiation by a user (i.e. by the user explicitly requesting termination of the connection to the wireless router) the wireless router informs the portal server of the imminent disconnection; the portal server then informs the AAA server, which updates its records accordingly (primarily for billing purposes where the user is charged on a duration of connection basis), and at the same time it (the portal server) sends a notification to the location server informing it of the disconnection.
  • Preferably, the location server communicates with a service exposure engine, such as that described in co-pending UK patent application No. 0407388.8 , which provides a common interface by which third party applications can access the information stored in the location server in a secure, safe and reliable manner. By secure, it is meant that only duly authorised and authenticated parties are able to access the location information, by safe it is meant that the location server will not be overwhelmed or cause problems to occur on the wireless network as a result of spurious or excessive requests from third parties and by reliable, it is meant that the correct information will be provided in response to a legitimate request from a third party.
  • Preferably, after the user has performed the initial authentication with the AAA server (via the portal server) for the first time at the start of setting up a connection via the wireless router, subsequent re-authentication of the user may be done automatically by the device on behalf of the user. Preferably this is done by including in the initially downloaded authentication web-page from the portal server a Javascript application or Java applet which stores the log-on credentials supplied by the user, for the duration of the connection, and uses these stored credentials to perform the re-authentication in a timely manner. Alternatively, a cookie could be used to prevent the user from having to continuously re-authenticate himself manually. The use of Javascript applications, Java applets and cookies for this sort of purpose is well understood in the art and will not be described further.
  • Brief Description of the Drawings
  • In order that the present invention may be better understood, embodiments thereof will now be described, by way of example only, with reference to the accompanying drawings in which:
    • Figure 1 is a schematic illustration of the overall architecture of a system according to an embodiment of the present invention;
    • Figure 2 is a sequence diagram showing the sequence in which signals pass between the mobile device of a user to be located, the network system viewed as a whole, a location application which permits other users to find out the location of user to be located, and a user employing the services of the location application to establish the location of the user to be located;
    • Figure 3 is a sequence diagram similar to that of Figure 2 but showing the signals passing between the mobile device of the user to be located and various components of the network grouped together as the system in Figure 2, during the initial authentication of the user to be located by the network;
    • Figure 4 is a sequence diagram similar to that of Figure 3 but relating to the logging off of the user to be located from the network; and
    • Figure 5 is a sequence diagram showing the signals passing between the location application of Figure 2 and two components of the network, illustrated as a grouped single entity in Figure 2, during the processing of a location query by the location application.
    Detailed Description of a first Embodiment
  • Referring now to Figure 1, the general architecture is seen to comprise a number of mobile devices 10, 12 which are wireless capable (e.g. via a IEEE 802.11x type protocol), a fixed device 20 running an application which assists users mobile users to locate one another, the Internet 30, an Authentication, Authorization and Accounting (AAA) server 40, which is operable to identify and authenticate a user, using a secure protocol such as RADIUS, on the basis of supplied user credentials (e.g. a user ID and (an encrypted) password), and the wireless network system 100 of the present embodiment.
  • The wireless network system 100 includes a plurality of wireless routers or Access Points 110, 112 (hereinafter simply AP's) with which the wireless capable mobile devices may establish a wireless connection; a captive portal server 120 which serves a mobile device with an initial logon web page as soon as it (the mobile device) connects to one of the AP's (as well as performing other functions described in more detail below); a user location manager server 140 which manages the databases of the system 100 which track user location information including a user database 142, which stores details of registered users and, if known, the AP to which they are currently connected, as well as an AP database 144, which stores details of the AP's 110, 112 including their MAC addresses, their geographical locations and, in the present embodiment, their unique ID's as provided by the wireless network operator; and finally, the system 100 also includes a capability exposure platform 150 which provides a safe, secure and reliable interface by which third parties may access the user location data managed by the user location manager server 140. In the present embodiment, the capability exposure platform 150 is that described in the present applicant's co-pending patent British patent application No. GB 0407388.8 .
  • Note that in the discussion which follows with reference to Figures 2 to 5 the AAA server 40 will be considered to be part of the system 100 since in the present embodiment the system 100 is co-owned and controlled by the service provider which operates and controls the AAA server 40 so it is appropriate to consider it as part of the system 100; however, it should be noted that in the more general case the AAA server may well be owned and operated by a different party to that which owns and operates the system 100, and indeed the system 100 may be operable to contact a number of different AAA servers depending upon which service provider the user subscribes to, etc and for that reason it is shown in Figure 1 as being outside the system 100 of the present embodiment.
  • Furthermore, the user location manager server 140 (and associated databases 142, 144) and/or the capability exposure platform 150 could also be owned and operated by a different party to that owning and/or operating the access points 110, 112 and captive portal server 120. Certainly, these various elements need not be geographically proximate to one another, etc.
  • Referring now to Figure 2, an overview of the messages sent between the mobile device 10 of the user to be located, the system 100, the device 20 running a location application, and the mobile device 12 of a locator user (i.e. a user who wishes to establish the location of the user of mobile device 10, who will hereinafter be referred to as the locatee user) when using the system of the present invention to enable the locator user to establish the location of the locatee user. The process commences when the locatee user decides to try to connect to the system 100 using a wireless interface between her mobile device 10 and one of the AP's of the system 100. Once a wireless connection has been established, the AP issues the mobile device 10 with a temporary IP address to be used for the duration of the session using the Dynamic Host Configuration Protocol (DHCP). As part of this process, the AP acquires the MAC address of the mobile device 10; this is then used as the basis of the firewall restrictions in the AP (discussed further below). Having completed this, the locatee user then requests a web page via a standard browser operating on mobile device 10 (illustrated in Figure 2 by the "user requests web page" arrow 205). Whatever web page the user requests, the system 100 returns (as indicated by the "request user authentication" arrow 210) an authentication web page requesting the user to log on to the system by providing her user credentials. The user fills in the requested credentials within the appropriate text fields provided within the authentication web page and these details are transmitted back from the mobile device 10 to the system 100 (as indicated by the "provide user credentials" arrow 215), for example by way of a new HTTP request. Having received the user credentials, the system 100 performs some internal processing (as indicated by the "authenticate user" arrow 220) the details of which will be described below with reference to Figure 3, to authenticate the user based on the received credentials. Having authenticated the user based on the received user credentials, the system 100 updates various records and gives the mobile device 10 full access to the Internet 30 (in alternative embodiments, restricted access could be given to only certain designated Internet sites, or to a company intranet, etc.); additionally it may send a confirmation web page initially confirming that the user has now been authorised to access the internet. In the present embodiment, the system provides the mobile device 10 with the originally requested web page (as illustrated by the "provide user access" arrow 225 in Figure 2).
  • At some time later, the locator user, who is using mobile device 12, decides that he wishes to locate his friend, the locatee user using mobile device 10. (Note that although the locator is shown as using mobile device 12 in Figure 1, there is no requirement for the locator's device to be mobile. Any computing device with an Internet connection could be used for this purpose.) He therefore sends a request location message (indicated by the "request user location" arrow 230 in Figure 2) to the device 20 running a buddy locating application. In the present embodiment, as illustrated in Figures 1 and 2, device 20 is a desktop personal computer configured to operate as a server computer in respect of users such as the locator user and configured to operate as a client in respect of the system 100 (and in particular the capability exposure platform 150 thereof, as will be described in greater detail below with reference to Figure 5). When the device 20 receives the "request user location" message 230 from mobile device 12, it performs some internal processing to check that the requester is authorised by the locatee user to receive the locatee user's location, and additionally it converts, if necessary, the user ID for the locatee user given by the locator user (which might be specific only to the location application running on device 20) into the user ID which will be recognised by the system 100. The internal processing within device 20 is indicated in Figure 2 by the "resolve user ID" arrow 235.
  • Having established that the locator is suitably authorised and having resolved the user ID (to find the user ID known by the system 100), the device 20 sends a message (indicated by the "locate user ID" arrow 240 in Figure 2) to the system 100 requesting the current location of the locatee user. The system 100 checks that the location application running on the device 20 is suitably authorised by the locatee user to access the locatee user's current location and then transmits this information back to the requesting application running on device 20 (as represented in Figure 2 by the "user location record" arrow 245). Finally the application running on device 20 sends (as shown by the "provide user location" arrow 250) the requested location information to mobile device 12 which displays the requested information to the locator user. Note that although not explicitly illustrated in Figure 1 or 2, the device 20 is connected to the Internet and is therefore able to receive requests from any device connected to the Internet. Similarly, the above described sequence of events assumes that the locator user has already successfully logged on to the system 100 such that it also has access to the Internet from which it can contact the device 20.
  • Referring now to Figure 3, the steps performed in initially logging a user onto the system 100 will now be described in more detail, with a consideration of the operations of the relevant elements within the system 100, in particular AP 110, captive portal server 120, AAA server 40 and the user location manager 140. When the mobile device 10 sends the initial request for a web page to the AP 110 (illustrated by the "request web page" arrow 305 in Figure 3, corresponding to arrow 205 in Figure 2) the AP 110 is configured to automatically re-direct this message (including any preliminary messages, e.g. to set up a TCP connection with the destination server in the first place, etc.) to the captive portal server 120 (as illustrated by the "redirect web request" arrow 310 from the AP 110 to the captive portal server 120) which responds by sending a log on web page to the mobile device 10 (as indicated by the "present logon page (HTTPS)" arrow 315 which corresponds to arrow 210 in Figure2). The log on web page includes text fields in which the user can enter his user credentials (e.g. a user ID and a password) which are then transmitted back to the captive portal server 120 (as indicated by the "log on credentials (HTTPS)" arrow 320 which corresponds to arrow 215 in Figure 2). The serving of the log on web page and the response with the user credentials is done using a secure HTTPS connection; the use of captive portal servers in this way is well known in the art and the details thereof will not be further discussed herein except to note that the process occurs with no special software being required by the user device 10.
  • When the captive portal server 120 has received the log on credentials from the user, it generates a request (illustrated by the "request to validate user" arrow 325) to the AAA server 40 using whichever protocol the AAA server is configured to use which, in the present embodiment, is RADIUS. The AAA server 40 receives the request, processes it and sends a response (indicated in Figure 3 by the "authentication status" arrow 330) back to the captive portal server 120. In the example illustrated in Figure 3 the response from the AAA server 40 indicates that the user is successfully authenticated and so the captive portal server 120 sends a message (indicated by the "return key" arrow 335 in Figure 3) to the access point 110 informing the access point 110 to allow the connected device 10 to have full access to the Internet 30. At about the same time, the captive portal 120 sends a message (indicated in Figure 3 by the "map user to AP" arrow 340) to the user location manager server 140, including the IP address of the access point 110 (as an identifier of the AP) and the user ID of the user submitted to the AAA server.
  • On receipt of the message 335 from the captive portal server 120, the access point 110 generates a "lease" of a predetermined time of, in the present embodiment, 2 minutes and reconfigures its firewall to allow IP packets (and/or HTTP requests and responses, etc.) from or to the mobile device 10 through its wired interface (which is connected directly or indirectly to the Internet 30) and through its wireless interface so that the user may browse the Internet, send emails, etc. for the duration of the lease (and beyond if the user re-authenticates before the expiry of the lease). The lease is issued based on the MAC address of the mobile device which should in theory be unique for that device. The generation of the lease and accompanying reconfiguration of its firewall is illustrated in Figure 3 by the "issue lease" arrow 345. Additionally, in the present embodiment, the access point also automatically permits the originally requested web page to be collected from the Internet 30 and automatically displayed to the user (in alternative embodiments, the captive portal server might send a confirmation web page informing the user that he has successfully logged on etc.). The transmission of the originally requested web page to the user is indicated in Figure 3 by the "redirect to requested page" arrow 350 (which corresponds to arrow 225 in Figure 2).
  • On receipt of the message 340 from the captive portal server 120, the user location manager server 140 updates its records in the user database 142 to specify IP address of the access point 110 to which the user is connected, together with the present time (in the present embodiment the typical lease time is the same for all users and all access points and so this information is stored centrally and used to determine, on the basis of the timestamp information stored in the user details, whether or not any particular record for any given user is valid or not).
  • Referring now to Figure 4, the steps taken by, and the messages passed between, the same components as illustrated in Figure 3, during an active logging out, of the mobile device 10 from the system 100, initiated by the mobile are now described. Thus, when the user decides to log out from the system, the mobile device 10 sends a "request logout" message 405 to the access point 110. When the access point receives this it revokes the "lease" given to the mobile device 10 by "taking back the IP address" (in accordance with the DHCP) from the mobile device 10 so it is free to allocate this to another device logging on to the AP 110 and by re-configuring its firewall to prevent Internet Protocol (IP) packets from passing through the AP 110 either to or from the mobile device 10 (or more specifically to or from the IP address or the MAC address of the mobile device 10). These process are indicated in Figure 4 by the "revoke lease" message 410 and the "change firewall" message 415 respectively. Having completed these changes, the AP 110 sends an "inform of logout" message 420 to the captive portal server 120, informing the captive portal server that the user has logged out, whereupon the captive portal server 120 sends a "notify of user logout" message 425 to the user location manager server 140 which updates its records to indicate that the corresponding user has now logged out of the network and thus its location is no longer known and/or valid. After sending the "inform of logout" message 420 to the captive portal server 120, the AP 110 also sends an "acknowledge logout" message 430 to the mobile device 10 to acknowledge that the device 10 has now been logged out of the system 100.
  • Referring now to Figure 5, the steps taken by, and the messages exchanged between, the location application (running on device 20), the capability exposure platform 150 and the user location manager server 140, during a request by the location application for location information about a user logged on to the system 100, are now described. When a third party application such as the location application running on device 20 wishes to obtain location information about a user who might be connected to the system 100 via a wireless AP, it sends a message to the capability exposure platform 150, typically, as in the present embodiment, via an Internet connection.
  • Thus, when the location application running on device 20 wishes, on behalf of one of its clients (i.e. the locator user operating mobile device 12), to obtain the current location of the locatee user, it sends a "query user location(user ID)" message 505 (which includes the (user ID) as known by the system 100). Upon receipt of this message 505, the capability exposure platform 150 performs some internal processing to authenticate the application (i.e. that it is what it says it is) and to check that it is duly authorised by the user to be located to obtain the information, as indicated by the "resolve privacy requirements" arrow 510. Having satisfied itself that the application's request is legitimate, it generates a "query user location (user ID)" message 515 of its own which is sent to the user location manager server 140.
  • Upon receipt of the query message 515, the location manager server 140 queries the user database 142 to determine if it has stored a current record of the identified user, and if so it obtains the identity of the AP 110 to which the user in question is currently connected (this process is indicated in Figure 5 by the "get User (user ID)'s AP" message 520). Having obtained the ID (or IP address) of the AP 110 to which the locatee user is connected, the user location manager server 140 then queries the AP database 144 (with a "get AP location record" message 525) to obtain the details of the whereabouts of the AP 110 (whose identity was determined from the preceding lookup in the user database 142) and then it passes on the obtained location information back to the capability exposure platform 150 with a "return location record" message 530. The capability exposure platform 150 then passes on this location information in turn back to the location application which asked for the information with a "return location record" message 535 of its own.

Claims (11)

  1. A computer network (100) operable to provide location information about a user of a mobile device (10) whilst the device is connected to the computer network via a wireless access point (110) to the network, the computer network including:
    a captive portal server (120), for requiring a user to be authenticated and authorised by a service provider to which the user subscribes when the user's mobile device is connected to the network via the wireless access point and for instructing the wireless access point to provide the mobile device with access to the network once the user has been duly authenticated and authorised; and
    a user location manager server (140) for managing the storage, processing and maintenance of user location details; wherein
    the captive portal server is further operable to notify the user location manager server, upon completion of a successful authentication or re-authentication of the user by the user's service provider, of the user's identity and the identity of the wireless access point to which the device is connected.
  2. A network as claimed in claim 1 further including an authentication, authorisation and accounting server 40 operable to authenticate a user in accordance with a secure authentication protocol.
  3. A network as claimed in claim 1 or 2 wherein each wireless access point to the network is operable to dynamically allocate an Internet Protocol address to the mobile device upon connection to the network for a lease period of limited duration.
  4. A network as claimed in claim 3 wherein the lease period is less than 15 minutes.
  5. A network as claimed in any one of the preceding claims further including a capability exposure platform (150) for providing an interface to third party applications to access the user location information.
  6. A method of obtaining location information about a user of a mobile device (10) connected to a computer network (100) via a wireless interface, the method comprising the device connecting to the computer network via the wireless interface and transmitting an HTTP request to the network, the network transmitting in response to the HTTP request a log-on web page to the device requesting user credentials, the network generating an authentication request in dependence upon the requested user log on credentials, and transmitting this to an AAA server (40), receiving a response from the AAA server and, if the response indicates that the user is authenticated and authorised, the network storing details of the identification of the user and of the access point of the network to which the mobile device is connected to the network via a wireless interface.
  7. A method as claimed in claim 6 wherein the network dynamically allocates an Internet Protocol address to the mobile device upon its connection to the network for a lease period of limited duration.
  8. A method as claimed in claim 7 wherein the lease period is less than 15 minutes.
  9. A method as claimed in claim 6, 7 or 8 further including exposing an interface to third party applications over the Internet by which they may query for location information about users connected to the network.
  10. A computer program or programs for controlling a computer network to carry out the method of any one of claims 6 to 9 during execution of the program or programs.
  11. Carrier means carrying the computer program or programs of claim 10.
EP05253558A 2005-03-22 2005-06-09 Method and apparatus for locating mobile device users within a wireless computer network Active EP1705869B1 (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
MYPI20051244A MY149845A (en) 2005-03-22 2005-03-22 Method and apparatus for locating mobile device users within a wireless computer network

Publications (2)

Publication Number Publication Date
EP1705869A1 true EP1705869A1 (en) 2006-09-27
EP1705869B1 EP1705869B1 (en) 2010-10-27

Family

ID=35005635

Family Applications (1)

Application Number Title Priority Date Filing Date
EP05253558A Active EP1705869B1 (en) 2005-03-22 2005-06-09 Method and apparatus for locating mobile device users within a wireless computer network

Country Status (5)

Country Link
EP (1) EP1705869B1 (en)
AT (1) ATE486446T1 (en)
DE (1) DE602005024358D1 (en)
ES (1) ES2354025T3 (en)
MY (1) MY149845A (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2519226A (en) * 2013-09-21 2015-04-15 Avaya Inc Captive portal systems, methods, and devices
JP2015111356A (en) * 2013-12-06 2015-06-18 日本電信電話株式会社 Disclosure degree control device, disclosure degree control method and program
EP2924950A1 (en) * 2014-03-23 2015-09-30 Avaya Inc. Authentication of client devices in networks
EP2961124A1 (en) * 2014-06-23 2015-12-30 Alcatel Lucent Method for enhancing captive portal service
WO2016041344A1 (en) * 2014-09-15 2016-03-24 中兴通讯股份有限公司 System and method for realizing capability opening and capability opening platform
US9531591B2 (en) 2014-03-23 2016-12-27 Avaya Inc. Configuration of networks using switch device access of remote server
US9549385B2 (en) 2014-03-23 2017-01-17 Avaya Inc. Configuration of networks using client device access of remote server
CN106465113A (en) * 2014-08-28 2017-02-22 谷歌公司 Venue-specific wi-fi connectivity notifications
CN106713244A (en) * 2015-11-17 2017-05-24 中国移动通信集团公司 Capability access method and network element
CN107211001A (en) * 2014-12-02 2017-09-26 亚马逊科技公司 Forced gate flow is acted on behalf of for input-bound device
CN109845329A (en) * 2016-10-27 2019-06-04 华为技术有限公司 A kind of communication means and equipment
US10382305B2 (en) 2013-11-15 2019-08-13 Microsoft Technology Licensing, Llc Applying sequenced instructions to connect through captive portals
US10582550B2 (en) 2013-11-15 2020-03-03 Microsoft Technology Licensing, Llc Generating sequenced instructions for connecting through captive portals
CN105635148B (en) * 2015-12-30 2020-07-28 新华三技术有限公司 Portal authentication method and device

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9369342B2 (en) 2013-11-15 2016-06-14 Microsoft Technology Licensing, Llc Configuring captive portals with a cloud service

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004049628A1 (en) * 2002-09-28 2004-06-10 Huawei Technologies Co., Ltd. A position system and method for subscribers in the wireless local area network
US20040166874A1 (en) * 2002-11-14 2004-08-26 Nadarajah Asokan Location related information in mobile communication system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1222791B1 (en) * 1999-10-22 2005-06-01 Nomadix, Inc. System und method for redirecting users attempting to access a network site

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004049628A1 (en) * 2002-09-28 2004-06-10 Huawei Technologies Co., Ltd. A position system and method for subscribers in the wireless local area network
EP1555778A1 (en) * 2002-09-28 2005-07-20 Huawei Technologies Co., Ltd. A position system and method for subscribers in the wireless local area network
US20040166874A1 (en) * 2002-11-14 2004-08-26 Nadarajah Asokan Location related information in mobile communication system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
KARCHER H: "Mobile Business: High-Speed Convenience for Business Travelers at Hotels and Airports", SIEMENS PUBLICATION, 24 April 2001 (2001-04-24), XP002200065 *

Cited By (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9294920B2 (en) 2013-09-21 2016-03-22 Avaya Inc. Captive portal systems, methods, and devices
US9787502B2 (en) 2013-09-21 2017-10-10 Extreme Networks, Inc. Captive portal systems, methods, and devices
GB2519226A (en) * 2013-09-21 2015-04-15 Avaya Inc Captive portal systems, methods, and devices
GB2519226B (en) * 2013-09-21 2020-11-04 Extreme Networks Inc Captive portal systems, methods and devices
US10582550B2 (en) 2013-11-15 2020-03-03 Microsoft Technology Licensing, Llc Generating sequenced instructions for connecting through captive portals
US10382305B2 (en) 2013-11-15 2019-08-13 Microsoft Technology Licensing, Llc Applying sequenced instructions to connect through captive portals
JP2015111356A (en) * 2013-12-06 2015-06-18 日本電信電話株式会社 Disclosure degree control device, disclosure degree control method and program
US11201814B2 (en) 2014-03-23 2021-12-14 Extreme Networks, Inc. Configuration of networks using switch device access of remote server
US9531591B2 (en) 2014-03-23 2016-12-27 Avaya Inc. Configuration of networks using switch device access of remote server
US9549385B2 (en) 2014-03-23 2017-01-17 Avaya Inc. Configuration of networks using client device access of remote server
EP2924950A1 (en) * 2014-03-23 2015-09-30 Avaya Inc. Authentication of client devices in networks
US10142342B2 (en) 2014-03-23 2018-11-27 Extreme Networks, Inc. Authentication of client devices in networks
US9813291B2 (en) 2014-03-23 2017-11-07 Extreme Networks, Inc. Shortest path bridging (SPB) configuration of networks using client device access of remote
EP2961124A1 (en) * 2014-06-23 2015-12-30 Alcatel Lucent Method for enhancing captive portal service
EP3186991A4 (en) * 2014-08-28 2018-04-04 Google LLC Venue-specific wi-fi connectivity notifications
GB2544417B (en) * 2014-08-28 2021-02-24 Google Llc Venue-specific WI-FI connectivity notifications
CN111491254A (en) * 2014-08-28 2020-08-04 谷歌有限责任公司 Wi-Fi connection notification for a particular venue
CN106465113A (en) * 2014-08-28 2017-02-22 谷歌公司 Venue-specific wi-fi connectivity notifications
CN106465113B (en) * 2014-08-28 2020-04-10 谷歌有限责任公司 Wi-Fi connection notification for a particular venue
US10091644B2 (en) 2014-09-15 2018-10-02 Zte Corporation System and method for implementing capability exposure, and capability exposure platform
WO2016041344A1 (en) * 2014-09-15 2016-03-24 中兴通讯股份有限公司 System and method for realizing capability opening and capability opening platform
CN105491557A (en) * 2014-09-15 2016-04-13 中兴通讯股份有限公司 System and method for achieving capability opening, and capability opening platform
CN105491557B (en) * 2014-09-15 2020-04-21 中兴通讯股份有限公司 System and method for realizing capability opening and capability opening platform
CN107211001B (en) * 2014-12-02 2020-06-16 亚马逊科技公司 Computing apparatus and method for proxy captive portal traffic for input-constrained devices
CN107211001A (en) * 2014-12-02 2017-09-26 亚马逊科技公司 Forced gate flow is acted on behalf of for input-bound device
CN106713244A (en) * 2015-11-17 2017-05-24 中国移动通信集团公司 Capability access method and network element
CN106713244B (en) * 2015-11-17 2021-01-15 中国移动通信集团公司 Capability access method and network element
CN105635148B (en) * 2015-12-30 2020-07-28 新华三技术有限公司 Portal authentication method and device
EP3531747A4 (en) * 2016-10-27 2019-08-28 Huawei Technologies Co., Ltd. Communication method and device
US10813026B2 (en) 2016-10-27 2020-10-20 Huawei Technologies Co., Ltd. Communication device and method for inter-system handover for a user equipment (UE)
CN109845329A (en) * 2016-10-27 2019-06-04 华为技术有限公司 A kind of communication means and equipment

Also Published As

Publication number Publication date
EP1705869B1 (en) 2010-10-27
DE602005024358D1 (en) 2010-12-09
ES2354025T3 (en) 2011-03-09
MY149845A (en) 2013-10-31
ATE486446T1 (en) 2010-11-15

Similar Documents

Publication Publication Date Title
EP1705869B1 (en) Method and apparatus for locating mobile device users within a wireless computer network
US9113332B2 (en) Method and device for managing authentication of a user
JP4536722B2 (en) Roaming across different access mechanisms and network technologies
JP4303130B2 (en) System, method and apparatus for single sign-on service
RU2564251C2 (en) Dynamic creation of account in protected network with wireless access point
EP3526947B1 (en) Improvements in and relating to network communication
JP4291213B2 (en) Authentication method, authentication system, authentication proxy server, network access authentication server, program, and recording medium
US20060195893A1 (en) Apparatus and method for a single sign-on authentication through a non-trusted access network
US20070094401A1 (en) Support for WISPr attributes in a TAL/CAR PWLAN environment
MXPA05009417A (en) User plane-based location services (lcs) system, method and apparatus.
JP2004505383A (en) System for distributed network authentication and access control
CN105981345B (en) The Lawful intercept of WI-FI/ packet-based core networks access
EP2355439A1 (en) Accessing restricted services
CN102820999B (en) Method for managing and controlling network service level and function of cloud virtual desktop application
WO2013041882A2 (en) User authentication in a network access system
KR102359070B1 (en) A portal aggregation service that maps subcarrier device identifiers to portal addresses to which access and authentication requests are redirected and facilitates mass subscriber device setup.
KR20200010417A (en) Improved network communication
JP6153622B2 (en) Method and apparatus for accessing network of internet protocol multimedia subsystem terminal
JP2004133824A (en) Service provision system based on remote access authentication
EP1843541B1 (en) A method of securing communication between an access network and a core network
JP2014153917A (en) Communication service authentication/connection system, and method of the same

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20060807

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU MC NL PL PT RO SE SI SK TR

AX Request for extension of the european patent

Extension state: AL BA HR LV MK YU

17Q First examination report despatched

Effective date: 20070302

AKX Designation fees paid

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU MC NL PL PT RO SE SI SK TR

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

RIC1 Information provided on ipc code assigned before grant

Ipc: H04L 29/08 20060101AFI20100507BHEP

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU MC NL PL PT RO SE SI SK TR

REG Reference to a national code

Ref country code: GB

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: CH

Ref legal event code: EP

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

REF Corresponds to:

Ref document number: 602005024358

Country of ref document: DE

Date of ref document: 20101209

Kind code of ref document: P

REG Reference to a national code

Ref country code: NL

Ref legal event code: VDEP

Effective date: 20101027

REG Reference to a national code

Ref country code: ES

Ref legal event code: FG2A

Effective date: 20110225

LTIE Lt: invalidation of european patent or patent extension

Effective date: 20101027

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20101027

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20101027

Ref country code: BG

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20110127

Ref country code: AT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20101027

Ref country code: PT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20110228

Ref country code: NL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20101027

Ref country code: SE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20101027

Ref country code: FI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20101027

Ref country code: IS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20110227

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20110128

Ref country code: BE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20101027

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: CZ

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20101027

Ref country code: EE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20101027

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: RO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20101027

Ref country code: DK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20101027

Ref country code: SK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20101027

Ref country code: PL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20101027

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

26N No opposition filed

Effective date: 20110728

REG Reference to a national code

Ref country code: DE

Ref legal event code: R097

Ref document number: 602005024358

Country of ref document: DE

Effective date: 20110728

REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

REG Reference to a national code

Ref country code: IE

Ref legal event code: MM4A

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20110609

Ref country code: LI

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20110630

Ref country code: CH

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20110630

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MC

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20110630

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20110609

Ref country code: CY

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20101027

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: TR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20101027

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: HU

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20101027

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 12

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 13

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 14

REG Reference to a national code

Ref country code: DE

Ref legal event code: R079

Ref document number: 602005024358

Country of ref document: DE

Free format text: PREVIOUS MAIN CLASS: H04L0029080000

Ipc: H04L0065000000

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: IT

Payment date: 20220518

Year of fee payment: 18

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: FR

Payment date: 20230523

Year of fee payment: 19

Ref country code: DE

Payment date: 20230523

Year of fee payment: 19

P01 Opt-out of the competence of the unified patent court (upc) registered

Effective date: 20230623

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: GB

Payment date: 20230523

Year of fee payment: 19

Ref country code: ES

Payment date: 20230703

Year of fee payment: 19